ic

9th Class Computer Science (English Medium)

Matric Part 1/9th Class Computer Science MCQ Test With Answer for Computer Science Full Book

9th Computer Science
Full Book Test

Start Full Book Test

9th Computer Science Chapter Wise Test

Top Scorers of 9th Class Computer English Medium KPK Boards Online Mcqs

I

Ishowspeed

Lahore20 - Nov - 2024

15/15
01 Mins 34 Sec
A

Alizah Khalid

Lahore09 - Oct - 2024

15/15
04 Mins 02 Sec
M

Mustafeez

Lahore09 - Sep - 2024

11/15
02 Mins 59 Sec
M

Mustafeez

Lahore09 - Sep - 2024

11/15
02 Mins 59 Sec
A

Ameena Khan

Lahore28 - Sep - 2024

11/15
03 Mins 32 Sec
T

Talha Jan

Lahore16 - Nov - 2024

8/15
03 Mins 50 Sec

Matric Part 1/9th Class Computer Science MCQ Test With Answer for Computer Science Full Book

Sr. # Questions Answers Choice
1 To convert a hexadecimal number to binary, simply covert each hexadecimal digit to _______ digits binary value:
  • A. Four
  • B. Two
  • C. Three
  • D. Five
2 Which is the initial stage of problems solving process ?
  • A. Defining
  • B. Analyzing
  • C. Porgramming
  • D. Stepping
3 Web browser and web servers function together as a _____ system:
  • A. Clent/server
  • B. Mail
  • C. Internet
  • D. Chrome
4 What is the purpose of an oval shape symbol in flowcharting ?
  • A. Decision
  • B. Connector
  • C. Process
  • D. Start or End
5 An ________ address is assigned by Dynamic Host Configuration Protocol (DHCP) server.
  • A. IP
  • B. TC
  • C. CP
  • D. ALP
6 In which method, we replace each alphabet in the plaintext by another alphabet:
  • A. Integrity
  • B. Cyber
  • C. Ceaser Cipher
  • D. Privacy
7 Vigenere Cipher is another substitution cipher, which uses a table known as:
  • A. Vigenere Cipher table
  • B. Simple table
  • C. Complex table
  • D. Round table
8 Which means whether the solution is giving the required results or not ?
  • A. Validation
  • B. Verification
  • C. Flowcharts
  • D. Software
9 Which tag is used for inserting a line break.
  • A. <br>
  • B. <h>
  • C. <i>
  • D. <m>
10 A crime in which computer network or devices are used is called a:
  • A. Lefting
  • B. Phishing crime
  • C. Identity Theft
  • D. Cybercrime

Share your comments questions here
Sort By:
X

Sign in

to continue to ilmkidunya.com

inquiry-image

Free Admission Advice

Fill the form. Our admission consultants will call you with admission options.

X

Sign in

to continue to ilmkidunya.com

X

Sign in

to continue to ilmkidunya.com

X

Forgot Password

to continue to ilmkidunya.com

X

Register Type

Please Provide following information to Register

  • Student
  • Tutor
  • Consultant
  • Employer